3 research outputs found
Wireless Intrusion Detection System Based on Data Mining
S rozšĂĹ™enĂm bezdrátovĂ˝ch sĂtĂ se bezpeÄŤnost v tÄ›chto sĂtĂch stává vážnĂ˝m problĂ©mem. Tato práce proto pĹ™edstavuje detekÄŤnĂ systĂ©m pro bezdrátovĂ© sĂtÄ›, kterĂ˝ vyuĹľĂvá dvÄ› neuronovĂ© sĂtÄ› k rozeznávánĂ vzorĹŻ ĂştokĹŻ v rámci zachycenĂ© komunikace. Jako Ĺ™ešenĂ problĂ©mu vysokĂ© mĂry falešnĂ˝ch poplachĹŻ pĹ™edstavuje tato práce právÄ› metodu vyuĹľitĂ tÄ›chto dvou neuronovĂ˝ch sĂtĂ.Widespread use of wireless networks has made security a serious issue. This thesis proposes misuse based intrusion detection system for wireless networks, which applies artificial neural network to captured frames for purpose of anomalous patterns recognition. To address the problem of high positive alarm rate, this thesis presents a method of applying two artificial neural networks.
How to Break EAP-MD5
Part 3: Protocols (Short Papers)International audienceWe propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, we crack the known length password using a rainbow table pre-computed with a fixed challenge, which can be done efficiently with great probability through off-line computations. This kind of attack can also be implemented successfully even if the underlying hash function MD5 is replaced with SHA-1 or even SHA-512